13
Pseudospoofing and Advogato  Pseudospoofing – many “identities” controlled by single adversary May shill for each other May pretend to attack each other  Advogato “trust metric” Create “trust graph,” find maximum flow from “trust source” to user. Pseudospoofing nodes have small flow from “trust source”  can’t “meaningfully” affect each other

14
Higher Ed P2P Why is Higher Ed special? More bandwidth Fluid user population (wireless coming…) “Bottleneck” bandwidth Early adopters on network What can P2P do for Higher Ed?

19
Where To Go Next  P2P-hackers mailing list Current technical P2P discussions.  Free Haven Project All the details I left out, recent work on reputations.  CiteSeer Indexes research papers like no one else.  O’Reilly OpenP2P.com